Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Michael Kratz
On 21/11/2012, at 6:17 AM, Tomas Podermanski wrote:

 Hi,
 
 On 11/20/12 7:24 PM, Blair Trosper wrote:
 I've found myself becoming a snob about IPv6.  I almost look down on
 IPv4-only networks in the same way that I won't go see a film that isn't
 projected on DLP unless my arm is twisted.  I'm a convert, and I'm glad to
 see the adoption rate edging up.
 
 However, I still scratch my head on why most major US ISPs *have* robust
 IPv6 peering and infrastructure and are ready to go, but they have not
 turned it on for their fiber/cable/DSL customers for reasons that are not
 clear to me.
 
 Turning IPv6 on at the basic/core of the infrastructure is the easiest
 part of the
 job. However turning IPv6 for customers requires a lot of effort and
 compromises. Some of the reasons are described in:   
 
 http://6lab.cz/article/deploying-ipv6-practical-problems-from-the-campus-perspective/
 
 and related presentation:
 
 http://6lab.cz/wordpress/wp-content/uploads/2012/05/tnc2012_slides_TncPresentation.pdf

We (Internode), an Australian ISP, have native dual-stack enabled by default 
(and have done for a while) for almost all new broadband services (ADSL, FTTH, 
etc.).

Our existing customers can turn it on via an online toolbox.

All the broadband CPE that we sell, support it.

It's largely a non-issue for us now.

Most new customers running a 'current' operating system, who buy an ADSL or 
FTTH service and their modem/router from us, automatically get IPv6 from day 
dot without even necessarily realising it.

We recently passed 5% of our customer base being on IPv6: 
http://www.internode.on.net/news/2012/10/288.php


--
Michael


Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Geoff Huston

On 21/11/2012, at 3:05 AM, Patrick W. Gilmore patr...@ianai.net wrote:

 On Nov 20, 2012, at 08:45 , Owen DeLong o...@delong.com wrote:
 
 It is entirely possible that Google's numbers are artificially low for a 
 number
 of reasons.
 
 AMS-IX publishes stats too:
   https://stats.ams-ix.net/sflow/
 
 This is probably a better view of overall percentage on the Internet than a 
 specific company's content.  It shows order of 0.5%.
 
 Why do you think Google's numbers are lower than the real total?

It depends on what you are trying to measure and how you are measuring it.

I don't know Google's methodology, but lets say its a simple form of the 
experiment:

When presented with a dual stack object what percentage of users prefer to 
retrieve that object using IPv6 as compared to IPv4?

Up so a year or so ago if a browser had access to IPv6 and IPv4 it would first 
attempt to connect using IPv6 and if the connection failed then it timed out 
and then tried to use IPv4. So the experiment would be roughly commensurate 
with measuring working IPv6 systems on end sites connected to workin ipv6 
access networks of one sort or another.

More recently some browsers (Safari on Mac OSX, Chrome, Firefox with config 
settings enabled) have adopted a different strategy and when presented with a 
dual stack object some clients  may end up trying the connection using IPv4 
first and then fall back to IPv6 if IPv4 fails or times out. If the experiment 
simply counts the percent of clients who prefer to connect using IPv6 in a Dual 
Stack scenario, then some of these users running more recent versions of the 
browser will not be counted.

There are ways to compensate for this, including running a series of tests, and 
this form of approach is described at http://labs.apnic.net/measureipv6/

I personally have no knowledge if the numbers published by Google reflect the 
prefers to use IPv6 in dual stack mode or is capable of using IPv6 (by 
virtue of being able to retrieve a IPv6 only object) These days the second 
number is larger than the first.

Geoff













Re: NTP Issues Today

2012-11-21 Thread Robert E. Seastrom

Blake Dunlap iki...@gmail.com writes:

 That's what happens when you just follow vendor recommendations blindly. If
 you do follow that on vm's (which can actually be a good practice), make
 sure they pull from your own time infrastructure, and not just the world at
 large, and that those servers behave in a sane fashion with regard to time
 jumps.

Emphatically disagree on the pull from your own infrastructure
point.  You probably don't have the budget even in a big company for
sufficient diversity of sources [*] for your NTP server and even if
you do the NTP servers will probably be run by the same
person/organization.  Mills has called the latter practice out as bad
in the past.

As Leo pointed out, the key is having a large diverse set so that if a
couple of them go nuts they can be voted off the island.

If you have a requirement for super low jitter or holdover if you lose
network, you're looking at on-site devices with OCXO or Rb frequency
standards in them.  That doesn't mean you shouldn't be talking to the
rest of the world too though.  What if your on-site sources go nuts?
This happens periodically, say every 10 years or so, because of crappy
implementations and worst-current-practices.  A re-read of
https://groups.google.com/forum/?fromgroups=#!search/mills$20ntp$20byzantine/comp.protocols.time.ntp/TryjqtAd1XM/R0zzzE13Tl8J
may prove instructive.

(reading list also includes http://www.amazon.com/dp/1439814635/ )

In my experience NTP beats out even DNS for blatantly wrong configs
in the wild that nevertheless seem to work well enough that dilettante
tech folks don't notice.

I might have replied to this thread yesterday but I was blissfully
unaware of any problems:

rs@bifrost [8] % ntpq -c peers | egrep -v '(===|remote)' | wc -l
  11
rs@bifrost [9] % 

-r

[*] particularly due to shortsighted US federal government choices on
LORAN, GOES, WWVB time format, etc




Re: NTP Issues Today

2012-11-21 Thread Ryan Malayter


On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote:

 wbai...@satelliteintelligencegroup.com
 
 Or you could just concede the fact that the navy is playing with time travel 
 again.
 --
 
 
 To finish this thread off for the archives...
 
 Apparently something was up with the navy stuff as a post on
 the outages shows.



Re: NTP Issues Today

2012-11-21 Thread Ryan Malayter


On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote:

 Lesson learned: Use more than one NTP source.
 

The lesson is: use MORE THAN TWO diverse NTP sources.

A man with two watches has no idea what the time it actually is.



Re: NTP Issues Today

2012-11-21 Thread Neil Harris

On 21/11/12 12:34, Ryan Malayter wrote:


On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote:


Lesson learned: Use more than one NTP source.


The lesson is: use MORE THAN TWO diverse NTP sources.

A man with two watches has no idea what the time it actually is.




Per David Mills, from the discussion linked upthread, this should be 
FOUR OR MORE...


Every critical server should have at least four sources, no two from the
same organization and, as much as possible, reachable only via diverse,
nonintersecting paths.

Four, so that the remaining three can reach consensus even if one fails.

-- Neil




Re: NTP Issues Today

2012-11-21 Thread Sid Rao
Guys:

We were synchronized against multiple sources. Unfortunately the Navy NTP 
source contaminated multiple downstream sources. 

Unless you can trace all your sources, if these sources all have a root source 
you will break. 

Sid Rao | CTI Group | +1 (317) 262-4677

On Nov 21, 2012, at 8:01 AM, Neil Harris n...@tonal.clara.co.uk wrote:

 On 21/11/12 12:34, Ryan Malayter wrote:
 
 On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote:
 
 Lesson learned: Use more than one NTP source.
 The lesson is: use MORE THAN TWO diverse NTP sources.
 
 A man with two watches has no idea what the time it actually is.
 
 Per David Mills, from the discussion linked upthread, this should be FOUR OR 
 MORE...
 
 Every critical server should have at least four sources, no two from the
 same organization and, as much as possible, reachable only via diverse,
 nonintersecting paths.
 
 Four, so that the remaining three can reach consensus even if one fails.
 
 -- Neil
 
 
 




RE: NTP Issues Today

2012-11-21 Thread Chuck Church
-Original Message-
From: Jimmy Hess [mailto:mysi...@gmail.com] 
Sent: Tuesday, November 20, 2012 7:50 PM
To: Van Wolfe
Cc: nanog@nanog.org
Subject: Re: NTP Issues Today

This  _should_   have caused NTP to execute a panic shutdown,
instead of setting the clock back  30 million seconds.

--
-JH

Sounds like SNTP might have been on the client.  Doesn't do much if any
sanity checking.  Windows used to use that, was more than happy to change
the time by years if bad time received.  Not sure if that is still the case.

Chuck




Re: NTP Issues Today

2012-11-21 Thread Greg Ihnen
It sounds like the Navy and who ever else they partner with (NIST?) need
some egress filtering on their NTP servers to catch and prevent events like
this.


Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Joe Maimon



Tony Hain wrote:

Tomas Podermanski wrote:


Hi,

 It seems that today is a big day for IPv6. It is the very first time

when

native IPv6 on google statistics
(http://www.google.com/intl/en/ipv6/statistics.html) reached 1%. Some
might say it is tremendous success after 16 years of deploying IPv6 :-)

T.


Or one could look at it as; despite 16 years of lethargy and lack of
deployment by access networks, the traffic still finds a way.  ;)

Tony


I say we better hope and pray that the network effect works as well for 
IPv6 as it did for IPv4. Otherwise 1% after 16 years represents nothing 
so much as ongoing failure.


I have had approximately 0.01% interest from any user base. That would 
be an interesting number to watch change.


Joe



Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Arturo Servin

It won't.

Users do not care about IPv6 or IPv4. They want a fast and reliable
Internet connection.

If you think you can do that with IPv4, you don't need to do anything
(well, just plan for some budget for your CGNs). If not, better start
deploying IPv6.

.as

On 21/11/2012 12:40, Joe Maimon wrote:
 I have had approximately 0.01% interest from any user base. That would
 be an interesting number to watch change.



Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Jay

On 11/20/2012 1:24 PM, Blair Trosper wrote:

However, I still scratch my head on why most major US ISPs *have* robust
IPv6 peering and infrastructure and are ready to go, but they have not
turned it on for their fiber/cable/DSL customers for reasons that are not
clear to me.

I keep pestering my home ISP about turning it on (since their network is
now 100% DOCSIS 3), but they just seem to think I'm making up words.  One
can hope, though.


This has partially been a vendor issue, at least for cable providers. 
Two of the major CMTS vendors (one starts with C, the other A) have had 
IPv6 related bugs in fairly recent code releases.Both of the MSOs 
I've worked for have had to delay IPv6 deployment while those vendors 
get their waterfowl properly aligned.  I know we're still waiting for 
one vendor to get it straightened out.


J



Re: NTP Issues Today

2012-11-21 Thread Jay Ashworth
- Original Message -
 From: Sid Rao s...@ctigroup.com

 We were synchronized against multiple sources. Unfortunately the Navy
 NTP source contaminated multiple downstream sources.
 
 Unless you can trace all your sources, if these sources all have a
 root source you will break.

... against multiple [Stratum 1] sources...

Baby, if you've ever wondered... whether it matters whether your sources
are strat 1 or not, now you know -- since there's no real way to get 
provenance on down-strat time sources that I'm aware of.

Does the NTP code, people who know, give any extra credence to strat-1
sources in it's byzantine code?

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA   #natog  +1 727 647 1274



Road Runner route server, AS20001 / 7843

2012-11-21 Thread David Hubbard
Anyone know of a route server on either of those
AS's?  Attempting to troubleshoot an issue that
they're blaming on a fiber cut in Texas so I have
to get more useful evidence to get it escalated.

Thanks,

David



Re: NTP Issues Today

2012-11-21 Thread Majdi S. Abbas
On Wed, Nov 21, 2012 at 10:41:01AM -0500, Jay Ashworth wrote:
 ... against multiple [Stratum 1] sources...
 
 Baby, if you've ever wondered... whether it matters whether your sources
 are strat 1 or not, now you know -- since there's no real way to get 
 provenance on down-strat time sources that I'm aware of.
 
 Does the NTP code, people who know, give any extra credence to strat-1
 sources in it's byzantine code?

Not in a way that matters if one of them suddenly becomes a 
falseticker.  If a reference clock goes insane, it's pretty easily 
detected provided you have at least two more servers (or even
peers configured.)

Stratum 1 just means it thinks it has a reference clock
attached, but those clocks fail, go into holdover, what have you
all the time.

NTP will happily select a stratum 2 or lower clock instead
provided it appears stable (low jitter, responded to our last 255
queries, and is an eligible candidate.)

To get an idea what your NTP server will do, try ntpq -p:

msa@paladin:/home/msa (582)$ ntpq -p
 remote   refid  st t when poll reach   delay   offset
jitter
==
-nist1.symmetric .ACTS.   1 u  304 1024  3775.1403.271
0.581
+nist1-sj.ustimi .ACTS.   1 u  307 1024  3777.8435.227
0.729
+64.147.116.229  .ACTS.   1 u  414 1024  3779.4065.742
0.068
*usno.pa-x.dec.c .USNO.   1 u  540 1024  3771.3734.242
0.032
-pegasus.latt.ne 64.250.177.145   2 u  304 1024  377   61.3835.920
6.578
-pyramid.latt.ne 216.171.124.36   2 u  361 1024  3771.0764.181
0.066

This is a stratum 2 server in the public pool.  It's peering
with two other stratum 2 servers that I run.  Those two are deselected
(-).  The server marked with a * is selected, and those with a + are
included in a weighted averdage used to maintain the system clock.
If the primary selected server does something wonky, it's going to 
select one of the candidates marked with a +.

In this case it has enough stratum 1 servers that it's not
likely to fall back to its peers, but it can do so if those servers
suddenly give it a set of unexpected replies.

--msa



RE: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Frank Bulk
We have cable broadband operations using vendor M and we're a little gun-shy 
because that vendor has lagged the other two with IPv6 support, and when 
Comcast and TimeWarner began their production IPv6 rollouts on their CMTes it 
wasn't with vendor M.

Frank

-Original Message-
From: Jay [mailto:tech-li...@packet-labs.net] 
Sent: Tuesday, November 20, 2012 10:52 PM
To: nanog@nanog.org
Subject: Re: Big day for IPv6 - 1% native penetration

On 11/20/2012 1:24 PM, Blair Trosper wrote:
 However, I still scratch my head on why most major US ISPs *have* robust
 IPv6 peering and infrastructure and are ready to go, but they have not
 turned it on for their fiber/cable/DSL customers for reasons that are not
 clear to me.

 I keep pestering my home ISP about turning it on (since their network is
 now 100% DOCSIS 3), but they just seem to think I'm making up words.  One
 can hope, though.

This has partially been a vendor issue, at least for cable providers. 
Two of the major CMTS vendors (one starts with C, the other A) have had 
IPv6 related bugs in fairly recent code releases.Both of the MSOs 
I've worked for have had to delay IPv6 deployment while those vendors 
get their waterfowl properly aligned.  I know we're still waiting for 
one vendor to get it straightened out.

J






Re: 25Mbps vs 4 Mbps

2012-11-21 Thread Kyle Creyts
Don't forget that in some cases, there are ISP-local cache boxes...
i.e. the Youtube Servers to which you refer may live _at_ the ISP.

On Mon, Nov 19, 2012 at 7:19 AM, Nick Olsen n...@flhsi.com wrote:
 It's all about if the bandwidth is there to use.

 I'm sure every youtube caching server has a connection which exceeds
 4Mb/s.

 How does a faster connection help? It allows the video to fill the buffer
 faster. Allowing for smoother playback on less bandwidth consistent
 circuits. Do you need it really if your video source is under 4Mb/s? In a
 perfect scenario, No.

 Now, That's youtube. Using Netflix as an example.

 I can start streaming a movie. And it'll pull 50-60Mb/s for about 20
 seconds, And it's playing HD quality almost immediately. Where on a slower
 connection it may not switch to HD until its filled its buffer more.

 Nick Olsen
 Network Operations (855) FLSPEED  x106

 
  From: Glen Kent glen.k...@gmail.com
 Sent: Monday, November 19, 2012 10:04 AM
 To: nanog@nanog.org nanog@nanog.org
 Subject: 25Mbps vs 4 Mbps

 Hi,

 The service provider(s) pipe that takes all web traffic from my laptop to
 the central servers (assume youtube) remain same whether i take a 4Mbps or
 a 25Mbps connection from my service provider. This means that the internet
 connection that i take from my service provider only affects the last mile
 -- from my home network to my service providers first access router. Given
 this, would one really see a 6 times improvement in a 25Mbps connection
 over a 4Mbps connection?

 I assume that the service providers rate limit the traffic much
 more aggressively in a 4Mbps connection. But this would only matter if the
 traffic from my youtube server is greater than 4Mbps, which i suspect
 would
 be the case.

 The question then is that how does going for a higher BW connection from
 the service provider help?

 Glen




-- 
Kyle Creyts

Information Assurance Professional
BSidesDetroit Organizer



Re: NTP Issues Today

2012-11-21 Thread Ask Bjørn Hansen

On Nov 20, 2012, at 13:00, Darius Jahandarie djahanda...@gmail.com wrote:

Hi everyone,

I run the NTP Pool system - http://www.pool.ntp.org/ - so I have some opinions 
on some of this. :-)

 But beyond that, I'm honestly rather curious what server selections
 are a good idea. A first thought would be an adjacent country, but
 maybe there is a benefit to picking things outside of the pool.ntp.org
 selection entirely?

First of all: None of the ~3800 servers in the NTP Pool system were affected by 
this as far as I can tell from the (copious) monitoring data.

The big benefit to adding some non-pool servers is that you wouldn't be 
depending basically on a bunch of volunteers (and to a large extent me) for 
your time keeping. Though likely you'd just be depending on another group of 
volunteers.

In addition to depending on the server operators who run the ntpd servers you 
also depend on:

1) The monitoring system keeping accurate time.
2) The monitoring system does its job catching bad servers.
3) The process updating and distributing the DNS data working.
4) The DNS servers working (and not being under a DoS attack or similar).
5) Anything I haven't thought of!

Empirically I believe we've done a better job than just about anyone with a 
similar scale, but past performance is no promise of the future.

 I see that Jared used *.fedora.pool.ntp.org -- I wonder if there was a
 specific reason for that or if my questions are even worth thinking
 about at all :-).


The servers for x.fedora.pool.ntp.org are in the same group as 
x.pool.ntp.org.  If you are in a country with many servers in the pool then 
you'll very likely get different IPs for the two. If you are in a country with 
few servers your odds for that aren't so good and it'd be a bit pointless.

Anyone using the NTP Pool in a default configuration (like Fedora does) must 
get a vendor zone setup - http://www.pool.ntp.org/en/vendors.html - so we 
have at least a little bit of a chance to monitor and mitigate problems.

It also allows us to change what servers are selected, how many IPs are 
returned etc for a particular vendor.  For example if Fedora in the future 
changes to use 'pool' instead of 'server' in the configuration we could 
optimize for that.


Ask

-- 
http://askask.com/


Re: The Verge article about Verizon's Sandy Cleanup Efforts in Manhattan

2012-11-21 Thread Kyle Creyts
And they do have those towers all over the country...

On Tue, Nov 20, 2012 at 12:47 PM, Miles Fidelman
mfidel...@meetinghouse.net wrote:
 Christopher Morrow wrote:

 apologies, I forgot the emoticons after my last comment. i really did mean
 it in jest... I don't think VZ has harnessed weather-changing-powers. (yet).


 Well, they ARE The Phone Company!

 --
 In theory, there is no difference between theory and practice.
 In practice, there is.    Yogi Berra





-- 
Kyle Creyts

Information Assurance Professional
BSidesDetroit Organizer



Recovering from spam resulting from compromised account

2012-11-21 Thread Dave Sotnick
Hello, oh knowledgeable NANOG.

I am the technical lead for network for Pixar. (Note: I am not the
mail admin, he's on vacation.) Yesterday we had an account compromise
that resulted in ~2.5M messages being sent through our two MTAs.

I have acknowledged/closed the two SpamCop incidents, and mail is
starting to flow, slowly, however we are still receiving bounces (some
hard!) and I am looking for assistance in getting Pixar's IPs cleared
from the blacklists.

I was pointed to:

http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.66
http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.94

Which shows we're still listed on Backscatterer and SPAM Cannibal.

Also had reports that we're still seeing bounces to Gmail, Comcast and
Yahoo accounts.

What can we do to speed things along? We have a ticket open with Gmail
folks since we have a studio who uses Gmail for Corporate mail. Any
Comcast or Gmail SMTP contacts on NANOG that can help? Would love to
get all out stuck mail out of these folks' MTAs.

Or do we need to just remove ourselves from the last two blacklists at
mxtoolbox?

Thanks,
David Sotnick
--
Pixar
Emeryville, CA



Re: Recovering from spam resulting from compromised account

2012-11-21 Thread Suresh Ramasubramanian
So -

1. backscatterer and spamcannibal are obscure blocklists nobody ever uses.
Spamcannibal is actually quite reasonable about removals if you declare the
issue fixed

2. Gmail, comcast etc have their own blocklist removal procedures - based
on you contacting their postmaster teams.  postmaster.comcast.net, etc etc.

3. MXToolbox is merely a search engine for various publicly available
blocklists.  Gmail etc blocks wont show up there because those dont get
exposed outside the provider's servers .. if you get listed on gmail you
know because you see your mail bounced or bulk foldered.

--srs


On Thu, Nov 22, 2012 at 7:23 AM, Dave Sotnick sotnickd-na...@ddv.comwrote:

 Hello, oh knowledgeable NANOG.

 I am the technical lead for network for Pixar. (Note: I am not the
 mail admin, he's on vacation.) Yesterday we had an account compromise
 that resulted in ~2.5M messages being sent through our two MTAs.

 I have acknowledged/closed the two SpamCop incidents, and mail is
 starting to flow, slowly, however we are still receiving bounces (some
 hard!) and I am looking for assistance in getting Pixar's IPs cleared
 from the blacklists.

 I was pointed to:

 http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.66
 http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.94

 Which shows we're still listed on Backscatterer and SPAM Cannibal.

 Also had reports that we're still seeing bounces to Gmail, Comcast and
 Yahoo accounts.

 What can we do to speed things along? We have a ticket open with Gmail
 folks since we have a studio who uses Gmail for Corporate mail. Any
 Comcast or Gmail SMTP contacts on NANOG that can help? Would love to
 get all out stuck mail out of these folks' MTAs.

 Or do we need to just remove ourselves from the last two blacklists at
 mxtoolbox?

 Thanks,
 David Sotnick
 --
 Pixar
 Emeryville, CA




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)


Re: Big day for IPv6 - 1% native penetration

2012-11-21 Thread Jonathan Towne
On Tue, Nov 20, 2012 at 11:51:50PM -0500, Jay scribbled:
# On 11/20/2012 1:24 PM, Blair Trosper wrote:
# However, I still scratch my head on why most major US ISPs *have* robust
# IPv6 peering and infrastructure and are ready to go, but they have not
# turned it on for their fiber/cable/DSL customers for reasons that are not
# clear to me.
# 
# I keep pestering my home ISP about turning it on (since their network is
# now 100% DOCSIS 3), but they just seem to think I'm making up words.  One
# can hope, though.
# 
# This has partially been a vendor issue, at least for cable
# providers. Two of the major CMTS vendors (one starts with C, the
# other A) have had IPv6 related bugs in fairly recent code releases.
# Both of the MSOs I've worked for have had to delay IPv6 deployment
# while those vendors get their waterfowl properly aligned.  I know
# we're still waiting for one vendor to get it straightened out.

I know it to be a vendor issue for GPON FTTH gear, as well.  At least with
one major vendor (begins with a C also).  They're definitely lagging.
We have an IPv6 deployment in the core natively, as well built as our IPv4
infrastructure, and yet nothing on the access side.  Any quarter now, I'm
still hearing.  Until then, we wait, and the pool of IPv4 dwindles.

-- Jonathan Towne



Re: Recovering from spam resulting from compromised account

2012-11-21 Thread Dave Sotnick
Thanks Matthew. Sadly, most of the bounce responses have URLs that
point you to a help page that doesn't have further contact information
or just tells you to wait it out.

e.g.

http://postmaster.yahoo.com/421-ts03.html
http://www.google.com/mail/help/bulk_mail.html

I'll do the requisite digging and start contacting postmasters.

-Dave

On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr
mb...@snap-interactive.com wrote:

 On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com wrote:
 Also had reports that we're still seeing bounces to Gmail, Comcast and
 Yahoo accounts.


 The best thing to do is to go ahead and look at the bounce messages from the 
 various ISP's, and see if they have any instructions or URL's to contact.

 If you don't have any of those messages at hand, you can see the bounce codes 
 in the logs of your mailserver.

 If you don't have any useful messages in the bounce code, then you can 
 probably look at the site for each ISP, and google their postmaster group.

 Matthew


 Matthew Barr
 Technical Architect
 Snap Interactive
 mb...@mbarr.net



Re: Recovering from spam resulting from compromised account

2012-11-21 Thread Andrew Jones

Hi Dave,
Try this page, linked from the google help page you referenced:
https://support.google.com/mail/bin/answer.py?hl=enanswer=81126rd=1

Hope that helps
Andrew

On 22.11.2012 13:29, Dave Sotnick wrote:

Thanks Matthew. Sadly, most of the bounce responses have URLs that
point you to a help page that doesn't have further contact 
information

or just tells you to wait it out.

e.g.

http://postmaster.yahoo.com/421-ts03.html
http://www.google.com/mail/help/bulk_mail.html

I'll do the requisite digging and start contacting postmasters.

-Dave

On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr
mb...@snap-interactive.com wrote:


On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com 
wrote:
Also had reports that we're still seeing bounces to Gmail, Comcast 
and

Yahoo accounts.



The best thing to do is to go ahead and look at the bounce messages 
from the various ISP's, and see if they have any instructions or URL's 
to contact.


If you don't have any of those messages at hand, you can see the 
bounce codes in the logs of your mailserver.


If you don't have any useful messages in the bounce code, then you 
can probably look at the site for each ISP, and google their 
postmaster group.


Matthew


Matthew Barr
Technical Architect
Snap Interactive
mb...@mbarr.net




Re: Recovering from spam resulting from compromised account

2012-11-21 Thread Suresh Ramasubramanian
Wait it out as in - you had better examine your mail queues and purge them
of any of the spam that was sent and is still queued up.

It'll still take a day or two after that's done for the blocks to subside.


On Thu, Nov 22, 2012 at 7:59 AM, Dave Sotnick sotnickd-na...@ddv.comwrote:

 Thanks Matthew. Sadly, most of the bounce responses have URLs that
 point you to a help page that doesn't have further contact information
 or just tells you to wait it out.

 e.g.

 http://postmaster.yahoo.com/421-ts03.html
 http://www.google.com/mail/help/bulk_mail.html

 I'll do the requisite digging and start contacting postmasters.

 -Dave

 On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr
 mb...@snap-interactive.com wrote:
 
  On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com
 wrote:
  Also had reports that we're still seeing bounces to Gmail, Comcast and
  Yahoo accounts.
 
 
  The best thing to do is to go ahead and look at the bounce messages from
 the various ISP's, and see if they have any instructions or URL's to
 contact.
 
  If you don't have any of those messages at hand, you can see the bounce
 codes in the logs of your mailserver.
 
  If you don't have any useful messages in the bounce code, then you can
 probably look at the site for each ISP, and google their postmaster group.
 
  Matthew
 
 
  Matthew Barr
  Technical Architect
  Snap Interactive
  mb...@mbarr.net




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)


H3C Technical List

2012-11-21 Thread Skeeve Stevens
Hey all,

Anyone know of a Mailing list like Cisco-NSP/Juniper-NSP for HP/H3C
equipment?

I have some questions regarding some H3C Switch spanning-tree behaviour,
but I can't find anyone to ask.  The couple of lists on puck have had
almost no traffic for a ling time.

Thanks all.

*
*
*Skeeve Stevens, CEO - *eintellego Pty Ltd
ske...@eintellego.net ; www.eintellego.net

Phone: 1300 753 383; Cell +61 (0)414 753 383 ; skype://skeeve

facebook.com/eintellego ;  http://twitter.com/networkceoau
linkedin.com/in/skeeve

twitter.com/networkceoau ; blog: www.network-ceo.net

The Experts Who The Experts Call
Juniper - Cisco – IBM - Brocade - Cloud
-
Check out our Juniper promotion website for Oct/Nov!  eintellego.mx
Free Apple products during this promotion!!!


RE: H3C Technical List

2012-11-21 Thread Neil
Hello there Skeeve!
 I'll see if I can help you out.  I work on comware (HPN/H3C) based gear quite 
a bit. 

Neil Moore  

-Original Message-
From: Skeeve Stevens [mailto:ske...@eintellego.net] 
Sent: Wednesday, November 21, 2012 11:08 PM
To: nanog@nanog.org
Subject: H3C Technical List

Hey all,

Anyone know of a Mailing list like Cisco-NSP/Juniper-NSP for HP/H3C equipment?

I have some questions regarding some H3C Switch spanning-tree behaviour, but I 
can't find anyone to ask.  The couple of lists on puck have had almost no 
traffic for a ling time.

Thanks all.

*
*
*Skeeve Stevens, CEO - *eintellego Pty Ltd ske...@eintellego.net ; 
www.eintellego.net

Phone: 1300 753 383; Cell +61 (0)414 753 383 ; skype://skeeve

facebook.com/eintellego ;  http://twitter.com/networkceoau 
linkedin.com/in/skeeve

twitter.com/networkceoau ; blog: www.network-ceo.net

The Experts Who The Experts Call
Juniper - Cisco - IBM - Brocade - Cloud
-
Check out our Juniper promotion website for Oct/Nov!  eintellego.mx Free Apple 
products during this promotion!!!